replies-to-on-this-post

replies-to-on-this-post | savvyessaywriters.org

Argento — Week 3

Anthony Argento posted Nov 7, 2017 10:17 PM

Subscribe

Sifers-Grayson is growing and everyone here should feel an enormous sense of pride and accomplishment in this fact. However, this expansion is driving certain changes, especially in the sphere of Identity Governance and Administration (IGA). Defining IGA is most easily accomplished by listing the three most important aspects of the idea as defined by Gartner. First, an IGA solution should “Manag(e) identity and access life cycles across multiple systems in a heterogeneous environment.” Second, IGA tools aggregate and correlate disparate identity and access rights data that is distributed throughout the IT landscape to enhance control over user access.” Finally, an “IGA is the central technology that manages the information about identities, accounts and entitlements.” (Rowling, 2016) All of these factors of an IGA solution are important in their own right, however the entire idea boils down to information security. Who is accessing information? Why are they accessing the information? How are they accessing the information?

As this expansion truly becomes more and more a reality, these questions will become more and more difficult to answer and consequently more challenging to defend to potential customers. The truth is that future business will depend on Sifers-Grayson’s ability demonstrate to clients that we can maintain the highest levels of information security. Our current paper-based system will not withstand the scrutiny associated with the elevated concerns of clients like the Department of Defense (DoD) and as such we must invest in a IGA solution that will live up to those expectations.

As Sifers-Grayson emerges from being a “Family” engineering house, concepts like separation of duties and least privilege will come more and more into play. In other words, no every employee of Sifers-Grayson requires access to every shred of information the company holds. An individual in finance does not need access to sensitive robotic schematics to effectively manage payroll. Likewise, a robotics engineer does not need access to payroll structures to efficiently design a circuit. Every employee of Sifers-Grayson must be provided the correct amount of access to do his or her job effectively and no more, or in other words – least privilege. (Miller, 2016)

The DoD which is rapidly becoming a significant customer, also requires that information be handled in a manner commiserate with its level of sensitivity. While this briefing will use the DoD as an example, Sifers-Grayson will need to begin handling all information, either self or customer generated, in accordance to sensitivity guidelines. The DoD specifically and by extension, Sifers-Grayson, treats information by three main classification levels in escalating levels of sensitivity: Confidential, Secret and Top Secret. (Quist, 1993) While this brief is not intended to be a primer on handling of classified information, it does provide an example of how future contracts will depend on Sifers-Grayson’s ability to classify data and correctly assign ownership of that data. Both concepts of classification and data ownership will serve to compartmentalize data thus rendering it more secure.

These challenges are not insignificant and will require increased levels of dedication from all departments, but as we have demonstrated by achieving this milestone we are up to the task. Stay tuned for additional briefs and specific IGA solution reviews coming in the near future.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.


The post replies-to-on-this-post appeared first on Affordable Nursing Writers.